390 likes | 568 Views
Cryptography Modern Cryptosystems. Overview. Classical Cryptography Simple Cryptosystems Cryptanalysis of Simple Cryptosystems Shannon’s Theory of Secrecy Modern Encryption Systems DES, AES. RSA. Signature Scheme(s). Cryptosystem.
E N D
Overview • Classical Cryptography • Simple Cryptosystems • Cryptanalysis of Simple Cryptosystems • Shannon’s Theory of Secrecy • Modern Encryption Systems • DES, AES. • RSA. • Signature Scheme(s) Asim Shahzad
Cryptosystem A cryptosystem is a five-tuple (P,C,K,E,D), where the following are satisfied: • P is a finite set of possible plaintexts. • C isa finite set of possible ciphertexts. • K, the key space, is a finite set of possible keys • KK, EKE (encryption rule), DKD (decryption rule). Each EK: PC and DK: CP are functions such that xP, DK(EK(x)) = x. Asim Shahzad
Notation • Alphabet {0, 1} (bits) • Plaintext and ciphertext {0, 1}* • New operation: XOR (EXOR, ) 0 0 = 0, 1 1 = 0, 0 1 = 1, 1 0 = 1, bitwise addition modulo 2. Asim Shahzad
Data Encryption Standard (DES) • 1973, NBS solicits proposals for cryptosystems for “unclassified” documents. • 1974, NBS repeats request.IBM responds with modification of LUCIFER.NBS asks NSA to evaluate.IBM holds patent for DES. • 1975, details of the algorithm published, public discussion begins. • 1976 Adapted as a standard for all unclassified government communications. Asim Shahzad
Data Encryption Standard (DES) • Originally designed to be efficient in hardware (4 bit was the norm in 1974). • A LOT of money has been invested in hardware. • First publicly available algorithm certified by NSA as secure. Certificate to be renewed every 5 years. Asim Shahzad
Data Encryption Standard (DES) • 1983, no problem. • 1987, passed, but • NSA says that DES soon will be vulnerable to brute-force attack. This is the last time. • Business lobbies to keep it, since so the had much invested. • 1993, still passed (no alternatives). • 1997, call for proposals: AES. Asim Shahzad
Data Encryption Standard (DES) • The algorithm • Uses blocks of size 64 bits. • Key of length 56 (well, 64, but 8 bits are just check bits) • Initial permutation IP. • 16 rounds. • Final permutation IP-1(IP and IP-1 have minorcryptographic value). Asim Shahzad
Data Encryption Standard (DES) • Key schedule K1, K2,…, K16 • Discard the parity-check bits of K. • Compute PC-1(K) = C0D0, where PC-1 is a fixed permutation, C0, D0 left and right halves, 28-bit each. • For i = 1, 2, …, 16:Ci := LSi(Ci-1),Di := LSi(Di-1),where LSi left cyclic shift of one (i= 1, 2, 9, 16) or two positions (else),Ki := PC-2(CiDi), PC-2 fixed permutation selecting 48 bits. Asim Shahzad
Data Encryption Standard (DES) • PC-1(K) = C0D0 57 49 41 33 25 17 9 1 58 50 42 34 26 18 • 2 59 51 43 35 27 19 11 3 60 52 44 36 63 55 47 39 31 23 15 7 62 54 46 38 30 22 • 6 61 53 45 37 29 21 13 5 28 20 12 4 Asim Shahzad
Data Encryption Standard (DES) • Ki := PC-2(Ci Di) 14 17 11 24 1 5 3 28 15 6 21 10 23 19 12 4 26 8 16 7 27 20 13 2 41 52 31 37 47 55 30 40 51 45 33 48 44 49 39 56 34 53 46 42 50 36 29 32 Asim Shahzad
Data Encryption Standard (DES) • x0 = IP(m) = L0R0. • 16 Rounds, i = 1, 2, …, 16:Li := Ri-1,Ri := Li-1 f (Ri-1 , Ki),wheref (Ri-1 , Ki) = P(S(E(Ri-1) Ki)),with operations E (expansion), S (S-box lookup), and P some (permutation). • c= IP-1(L16R16). Asim Shahzad
Data Encryption Standard (DES) • x0 = IP(m) = L0R0Initial Permutation 58 50 42 34 26 18 10 2 60 52 44 36 28 20 12 4 62 54 46 38 30 22 14 6 64 56 48 40 32 24 16 8 57 49 41 33 25 17 9 1 59 51 43 35 27 19 11 3 61 53 45 37 29 21 13 5 63 55 47 39 31 23 15 7 Asim Shahzad
Data Encryption Standard (DES) • f (Ri-1 , Ki) = P(S(E(Ri-1) Ki))Expansion: 32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 32 1 Asim Shahzad
Data Encryption Standard (DES) • f (Ri-1 , Ki) = P(S(E(Ri-1) Ki)) S-box lookup • There are 8 S-boxes: S1,…, S8For example S5: 2 12 4 1 7 10 11 6 8 5 3 15 13 0 14 9 14 11 2 12 4 7 13 1 5 0 15 10 3 9 8 6 4 2 1 11 10 13 7 8 15 9 12 5 6 3 0 14 11 8 12 7 1 14 2 13 6 15 0 9 10 4 5 3 • 416 array of 4-bit binary numbers. Asim Shahzad
Data Encryption Standard (DES) • f (Ri-1 , Ki) = P(S(E(Ri-1) Ki)) • E(Ri-1) Ki = B1B2…B7B8. • For j = 1, 2,…, 8, let Bj = b1 b2 b3 b4 b5b6. • In S-box Sj:b1 b6 binary coordinate of a row r,b2 b3 b4 b5bin. coord. of a column c. • Replace Bj with Sj(r, c). Asim Shahzad
Data Encryption Standard (DES) • f (Ri-1 , Ki) = P(S(E(Ri-1) Ki)) P fixed permutation 16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10 2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25 • Result: bitstring of length 32. Asim Shahzad
Data Encryption Standard (DES) • c= IP-1(L16R16) 14 17 11 24 1 5 3 28 15 6 21 10 23 19 12 4 26 8 16 7 27 20 13 2 41 52 31 37 47 55 30 40 51 45 33 48 44 49 39 56 34 53 46 42 50 36 29 32 Asim Shahzad
Data Encryption Standard (DES) • DES is efficient1992, DEC fabricated a 50K transistor chip that could encrypt at the rate 1Gbit/sec using a clock rate of 250 MHz. Cost $300. • The Avalanche EffectSmall change in either the plaintext or the key produces a significant change in the ciphertext. Asim Shahzad
Data Encryption Standard (DES) • Strength of DES: the S-boxes • DES permutations don’t form a group, they generate a group of size at least 102499. • Double encryption using 2 different keys is not stronger (surprise) than a single encryption (meet-in-the-middle attack) • Triple-DES (3-DES) is stronger and very popular recently. Asim Shahzad
Data Encryption Standard (DES) • The DES controversy • Why 56 is the key length? LUCIFER had 128.The key space 256 is too small. • Why 16 rounds? • Why were the criteria for the S-boxes classified?Did NSA put “trapdoors” into the S-boxes?No evidence of “trapdoors” so far. Asim Shahzad
Data Encryption Standard (DES) • Attacks on DES • 1977, Diffie & Hellman suggested a VLSI chip that could test 106 keys/sec. A machine with 106 chips could test the entire key space in 10 hours. Cost: $20,000,000. • 1990, differential cryptanalysis, Eli Biham, Adi Shamir (Israel). • 1993, linear cryptanalysis, Mitsuru Masui (Japan). Asim Shahzad
Data Encryption Standard (DES) • Attacks on DES • The Electronic Frontier Foundation (EFF). • July 17, 1998, the EFF DES Cracker broke the DES-encrypted message in 56 hours. 1,536 chips, testing 88109 keys/sec. Cost < $250,000. • January 19, 1999, Distributed.Net, a worldwide coalition of computer enthusiasts, worked with EFF's DES Cracker and a worldwide network of nearly 100,000 PCs on the Internet, broke the DES-encrypted message in 22 hours and 15 minutes. Asim Shahzad
Advanced Encryption Standard • AES = Advanced Encryption Standard • 1997, NIST solicited proposals for AES • June 15, 1998, of the 21 submitted, 15 meet the NIST’s criteria:Rijndael (Belgium), Serpent (UK, Israel, Norway), FROG (Costa Rica), LOKI97(Australia), Magenta (Germany), CAST-256, DEAL (Canada), DFC (France), CRYPTON (Korea), Hasty Pudding Cipher (HPC), RC6, MARS, SAFER+, Twofish (USA) E2 (Japan), Asim Shahzad
Advanced Encryption Standard • August 9, 1999, NIST announced 5 finalists:Rijndael (Belgium), RC6, MARS, Twofish (USA), Serpent (UK, Israel, Norway). • October 2, 2000, The US Commerce Department announced: Rijndael = AES. Asim Shahzad
Rijndael • Block size 128 bits,supports also 192 and 256 bits. • Key sizes: 128, 192, 256 bits. • Number of rounds10 (block and key 128),12 (block or key 192),14 (block or key 256). • Not a Feistel Network. • Uses GF(28), , new S-boxes, permutations. Asim Shahzad
Rijndael Asim Shahzad
Key Distribution Problem • Both DES and AES are private, symmetric key cryptosystems. • Encryption and decryption keys are the same. • Both keys must be kept secret from Oscar • Alice and Bob must exchange keys over a secure channel. • What if they cannot? Asim Shahzad
Diffie-Hellman Key Exchange • p - LARGE prime (public). • - primitive element of Zp (public). • Alice: selects a (secret), computes a(mod p) and sends it to Bob. • Bob: selects b (secret), computes b(mod p) and sends it to Alice. • Alice computes K = (b)a(mod p). • Bob computes K = (a)b(mod p). Asim Shahzad
Diffie-Hellman Key Exchange • D-H security is based on discrete log problem: Let p be a prime number, Zp primitive element, and Zp. Find the unique xZ, 0 x p-2, such that x (mod p). • Difficult, especially if p has at least 150 digits and p-1 has at least one “large” prime factor (“strong” prime). • No known polynomial-time algorithm. Asim Shahzad
Fermat And Euler • Fermat’s Little Theorem Let p be prime, aZ+, a not a multiple of p. Then a p-1 1 (mod p). • Euler’s “phi” function nZ+, (n) = |{zZ+: gcd(z, n) = 1}|, (1) = 1. • Euler’s Theorem a, nZ+, gcd(a, n)=1 a (n) 1 (mod n). Asim Shahzad
RSA (public key encryption) • Ron Rivest, Adi Shamir, Leonard Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Communications of the ACM, Vol. 21, no. 2, February 1978, 120-126. • REVOLUTION! • www.rsa.com Asim Shahzad
RSA (public key encryption) • Alice wants Bob to send her a message. She: • selects two (large) primes p, q, TOP SECRET, • computes n = pq and (n) = (p-1)(q-1), (n) also TOP SECRET, • selects an integer e, 1 < e < (n), such that gcd(e, (n)) = 1, • computes d, such that de 1 (mod (n)), d also TOP SECRET, • gives public key (e, n), keeps private key (d, n). Asim Shahzad
RSA (public key encryption) • RSA in action • Bob wants to send plaintext P, 0 < P < n. Encryption: E(e, n)(P) = C = Pe (mod n). Bob sends ciphertext C. • Alice receives C. Decryption: D(d, n)(C) = Cd (mod n) = P (ha!) Asim Shahzad
RSA (public key encryption) • Does it work? • Yes! D(d, n)(C) = D(d, n)(P e) = P ed= = P k(n)+1 = de 1 (mod (n)) = (P(n))k P P (mod n). Euler’s Theorem Asim Shahzad
RSA (public key encryption) • Is it secure? • Yes, if p and q are large primes (over 150 decimal digits each). • Factoring is a HARD problem, no known polynomial time algorithm. • http://www.rsa.com/rsalabs/challenges/factoring/numbers.html • RSA is much slower than DES or AES. Asim Shahzad
RSA (public key encryption) • Alice’s Signature • Alice encrypts her signature S using her private key: E(d, n)(S) = T = Sd (mod n) and sends T to Bob. • Bob decrypts T using Alice’s public key to authenticate her message: D(d, n)(T) = Td (mod n) = S. Asim Shahzad
The EndCryptography, Part 2: Modern Cryptosystems CryptographyPart 3: Quantum Cryptography Stay Tuned… (but don’t hold your breath)